Searched refs:decode (Results 1 – 25 of 49) sorted by relevance
12
/hostap-latest/tests/hwsim/ |
D | tshark.py | 52 out = output[0].decode(errors='ignore') 53 out1 = output[1].decode() 76 out = cmd.communicate()[0].decode() 122 out = output[0].decode()
|
D | test_hs20_filter.py | 35 … o = subprocess.check_output(self._cmd + ['show', 'tentative', 'dev', self._iface]).decode() 170 pkt = binascii.hexlify(pkt).decode() 175 if hapd.own_addr() in subprocess.check_output(['ip', 'neigh', 'show']).decode(): 197 pkt = binascii.hexlify(pkt).decode() 202 if hapd.own_addr() in subprocess.check_output(['ip', 'neigh', 'show']).decode():
|
D | remotehost.py | 27 buf = subprocess.check_output(command, stderr=err, bufsize=0).decode() 80 return status, buf.decode() 101 return status, buf.decode() 201 line = line.decode() 223 res = proc.stdout.read(4094).decode()
|
D | test_p2p_messages.py | 804 …=1 action={}".format(addr0, addr0, peer['listen_freq'], binascii.hexlify(msg['payload']).decode())) 830 …=1 action={}".format(addr0, addr0, peer['listen_freq'], binascii.hexlify(msg['payload']).decode())) 912 addr0, addr0, peer['listen_freq'], binascii.hexlify(msg['payload']).decode())) 933 addr0, addr0, rx_msg['freq'], binascii.hexlify(msg['payload']).decode())) 950 addr0, addr0, rx_msg['freq'], binascii.hexlify(msg['payload']).decode())) 970 addr0, addr0, rx_msg['freq'], binascii.hexlify(msg['payload']).decode())) 990 addr0, addr0, rx_msg['freq'], binascii.hexlify(msg['payload']).decode())) 1007 addr0, addr0, rx_msg['freq'], binascii.hexlify(msg['payload']).decode())) 1039 addr0, addr0, rx_msg['freq'], binascii.hexlify(msg['payload']).decode())) 1063 addr0, addr0, rx_msg['freq'], binascii.hexlify(msg['payload']).decode())) [all …]
|
D | test_dpp.py | 86 "DPP:K:" + base64.b64encode(b"hello").decode() + ";;", 393 …d=%s pass=%s" % (binascii.hexlify(ssid.encode()).decode(), binascii.hexlify(passphrase.encode()).d… 924 … init_extra="conf=sta-psk pass=%s" % binascii.hexlify(b"passphrase").decode(), 940 ssid1h = binascii.hexlify(ssid1.encode()).decode() 941 pass1h = binascii.hexlify(pass1.encode()).decode() 942 ssid2h = binascii.hexlify(ssid2.encode()).decode() 943 pass2h = binascii.hexlify(pass2.encode()).decode() 994 ssid1h = binascii.hexlify(ssid1.encode()).decode() 995 ssid2h = binascii.hexlify(ssid2.encode()).decode() 996 pass2h = binascii.hexlify(pass2.encode()).decode() [all …]
|
D | test_wnm.py | 423 msg['da'], msg['bssid'], binascii.hexlify(msg['payload']).decode())) 438 msg['da'], msg['bssid'], binascii.hexlify(msg['payload']).decode())) 2041 dev[0].set("coloc_intf_elems", binascii.hexlify(no_intf).decode()) 2045 if addr + " 1 " + binascii.hexlify(no_intf).decode() not in ev: 2057 res = dev[0].request("COLOC_INTF_REPORT " + binascii.hexlify(no_intf).decode()) 2063 if addr + " 0 " + binascii.hexlify(no_intf).decode() not in ev: 2141 mgmt_tx(dev[0], cmd + binascii.hexlify(payload).decode()) 2147 mgmt_tx(dev[0], cmd + binascii.hexlify(payload).decode()) 2153 mgmt_tx(dev[0], cmd + binascii.hexlify(payload).decode()) 2159 mgmt_tx(dev[0], cmd + binascii.hexlify(payload).decode()) [all …]
|
D | test_macsec.py | 190 res = cmd.stdout.read().decode() 197 res = cmd.stdout.read().decode() 512 res = cmd.stdout.read().decode() 520 res = cmd.stdout.read().decode() 528 res = cmd.stdout.read().decode() 535 res = cmd.stdout.read().decode() 543 res = cmd.stdout.read().decode() 551 res = cmd.stdout.read().decode() 684 res = c.stdout.read().decode()
|
D | test_eap_proto.py | 187 logger.info("eap_handler - RX " + binascii.hexlify(req).decode()) 409 logger.info("eap_handler - RX " + binascii.hexlify(req).decode()) 511 logger.info("sake_handler - RX " + binascii.hexlify(req).decode()) 874 logger.info("sake_handler - RX " + binascii.hexlify(req).decode()) 1011 sess = binascii.hexlify(struct.pack('B', (sess + 1) % 256)).decode() 1071 logger.info("leap_handler - RX " + binascii.hexlify(req).decode()) 1240 logger.info("leap_handler2 - RX " + binascii.hexlify(req).decode()) 1542 logger.info("md5_handler - RX " + binascii.hexlify(req).decode()) 1712 logger.info("otp_handler - RX " + binascii.hexlify(req).decode()) 1776 logger.info("otp_handler2 - RX " + binascii.hexlify(req).decode()) [all …]
|
D | test_fils.py | 631 expected += binascii.hexlify(hash[0:2]).decode() 644 expected += binascii.hexlify(hash[0:2]).decode() 806 "ff:ff:ff:ff:ff:ff " + binascii.hexlify(dhcpdisc).decode()] 901 …n dev[0].request("FILS_HLP_REQ_ADD " + "ff:ff:ff:ff:ff:ff " + binascii.hexlify(dhcpdisc).decode()): 948 …n dev[0].request("FILS_HLP_REQ_ADD " + "ff:ff:ff:ff:ff:ff " + binascii.hexlify(dhcpdisc).decode()): 1121 "0800" + binascii.hexlify(ipv4_overflow).decode(), 1122 "0800" + binascii.hexlify(ipv4_unknown_proto).decode(), 1123 "0800" + binascii.hexlify(ipv4_missing_udp_hdr).decode(), 1124 "0800" + binascii.hexlify(udp_overflow).decode(), 1125 "0800" + binascii.hexlify(udp_underflow).decode(), [all …]
|
D | test_dpp3.py | 68 ssid = binascii.hexlify("sae".encode()).decode() 69 password = binascii.hexlify("sae-password".encode()).decode() 413 ssid_hex = binascii.hexlify(ssid.encode()).decode() 530 ssid_hex = binascii.hexlify(ssid.encode()).decode() 557 ssid_hex = binascii.hexlify(ssid.encode()).decode()
|
D | wlantest.py | 115 return subprocess.check_output([self.wlantest_cli] + params).decode() 285 res[0].decode().strip())) 288 res[1].decode().strip()))
|
D | test_ap_hs20.py | 137 "GSM-AUTH-REQ 232010000000000 " + rand]).decode() 359 if binascii.hexlify(b"example.com").decode() not in nai1: 361 if binascii.hexlify(b"example.org").decode() in nai1: 363 if binascii.hexlify(b"example.com").decode() not in nai2: 365 if binascii.hexlify(b"example.org").decode() not in nai2: 3217 hex = binascii.hexlify(icon).decode() 3564 if bss["hs20_operator_icon_metadata"] != binascii.hexlify(value).decode(): 4345 if "OK" not in dev[0].request("DATA_TEST_FRAME " + binascii.hexlify(pkt).decode()): 4351 if "OK" not in dev[1].request("DATA_TEST_FRAME " + binascii.hexlify(pkt).decode()): 4357 if "OK" not in dev[1].request("DATA_TEST_FRAME " + binascii.hexlify(pkt).decode()): [all …]
|
D | test_ap_ft.py | 1010 snonce = binascii.hexlify(req['payload'][111:111+32]).decode() 1015 snonce = binascii.hexlify(req['payload'][111:111+32]).decode() 1020 r0khid = binascii.hexlify(req['payload'][145:145+10]).decode() 1025 r0khid = binascii.hexlify(req['payload'][145:145+10]).decode() 2874 if "OK" not in dev[0].request("DATA_TEST_FRAME " + binascii.hexlify(pkt).decode()): 2879 if "OK" not in dev[0].request("DATA_TEST_FRAME " + binascii.hexlify(pkt).decode()): 2884 if "OK" not in dev[0].request("DATA_TEST_FRAME " + binascii.hexlify(pkt).decode()): 2889 if "OK" not in dev[0].request("DATA_TEST_FRAME " + binascii.hexlify(pkt).decode()): 2894 if "OK" not in dev[0].request("DATA_TEST_FRAME " + binascii.hexlify(pkt).decode()): 2899 if "OK" not in dev[0].request("DATA_TEST_FRAME " + binascii.hexlify(pkt).decode()): [all …]
|
D | test_gas.py | 1035 …GMT_TX {} {} freq=2412 wait_time=10 action={}".format(bssid, bssid, binascii.hexlify(msg).decode()) 1067 …GMT_TX {} {} freq=2412 wait_time=10 action={}".format(bssid, bssid, binascii.hexlify(msg).decode()) 1227 public_id = binascii.hexlify(held + supl).decode() 1652 venue_name = binascii.hexlify(venue_info + venue1 + venue2).decode() 1658 venue_url = binascii.hexlify(duple1 + duple2).decode() 1696 if not bss['anqp_capability_list'].startswith(binascii.hexlify(ids).decode()): 1715 venue_name = binascii.hexlify(venue_info + venue1 + venue2).decode() 1721 venue_url = binascii.hexlify(duple1 + duple2).decode() 1756 if not bss['anqp_capability_list'].startswith(binascii.hexlify(ids).decode()): 1915 …GMT_TX {} {} freq=2412 wait_time=10 action={}".format(bssid, bssid, binascii.hexlify(msg).decode()) [all …]
|
D | utils.py | 153 reg = cmd.stdout.read().decode() 162 reg = cmd.stdout.read().decode() 170 reg_rules = cmd.stdout.read().decode().splitlines()
|
D | test_ap_eap.py | 136 def read_pem(fname, decode=True): argument 143 if not decode: 150 if not decode: 152 if decode: 343 encrypted_id = base64.b64encode(data).decode() 709 "GSM-AUTH-REQ 232010000000000 " + rand]).decode() 735 "GSM-AUTH-REQ 232010000000009 " + rand]).decode() 775 "GSM-AUTH-REQ 232010000000000 " + rand]).decode() 802 "GSM-AUTH-REQ 232010000000009 " + rand]).decode() 845 "GSM-AUTH-REQ 232010000000000 " + rand]).decode() [all …]
|
D | test_nfc_wps.py | 165 binascii.hexlify(new_ssid.encode()).decode() + 167 binascii.hexlify(new_passphrase.encode()).decode()) 210 binascii.hexlify(new_ssid.encode()).decode() + 212 binascii.hexlify(new_passphrase.encode()).decode())
|
D | test_hs20_pps_mo.py | 23 "set_pps", pps_mo]).decode()
|
D | test_wmediumd.py | 73 verstr = subprocess.check_output(['wmediumd', '-V']).decode() 112 line = p.stdout.readline().decode() 125 output_wmediumd_log(p, params, stdoutdata.decode())
|
D | hostapd.py | 60 return ret, out.decode() 177 return ret, out.decode() 407 res = self.request("MGMT_TX " + binascii.hexlify(hdr + msg['payload']).decode()) 500 cmd += " ssid=" + binascii.hexlify(ssid.encode()).decode() 545 cmd += " ssid=" + binascii.hexlify(ssid.encode()).decode() 547 cmd += " pass=" + binascii.hexlify(passphrase.encode()).decode()
|
/hostap-latest/wpa_supplicant/examples/ |
D | wps-nfc.py | 84 return ret.rstrip().decode("hex") 94 return ret.rstrip().decode("hex") 104 return ret.rstrip().decode("hex") 113 return ret.rstrip().decode("hex") 126 return res.decode("hex")
|
D | p2p-nfc.py | 97 return res.decode("hex") 106 return res.decode("hex") 119 return res.decode("hex") 129 return res.rstrip().decode("hex")
|
/hostap-latest/hostapd/ |
D | wps-ap-nfc.py | 78 return ret.rstrip().decode("hex") 88 return ret.rstrip().decode("hex") 98 return ret.rstrip().decode("hex")
|
/hostap-latest/wpaspy/ |
D | wpaspy.py | 96 res = self.s.recv(4096).decode() 144 res = self.s.recv(4096).decode()
|
/hostap-latest/tests/hwsim/vm/ |
D | parallel-vm.py | 106 out = out.decode() 195 err = err.decode() 490 name = l.decode().split(' ')[0] 701 ver = cmd.stdout.read().decode().strip()
|
12